karnapke-routingSensornetMANET

  • Upload
    gynx

  • View
    221

  • Download
    0

Embed Size (px)

Citation preview

  • 8/9/2019 karnapke-routingSensornetMANET

    1/7

    A Combined Routing Layer for Wireless Sensor Networks and Mobile Ad-Hoc

    Networks

    Tobias Senner, Reinhardt Karnapke, Andreas Lagemann, Jorg Nolte

    Distributed Systems/Operating Systems Group

    Brandenburg University of Technology

    Cottbus, Germany

    {tsenner, karnapke, ae, jon}@informatik.tu-cottbus.de

    Abstract

    In the near future, first responders such as firefighters

    might be supported by sensor nodes, both installed beforethe incident and placed by the responders themselves. To

    communicate with these sensor nodes, the first responders

    could be equipped with hand held devices, e.g. PDAs with

    wireless LAN, additionally equipped with a radio module of

    the same type as used by the sensor nodes. This scenario

    enables the usage of the PDAs as mobile communication

    backbone by the sensor nodes, as well as allowing the first

    responders to access nodes in the sensor network in an effi-

    cient way, both near and far. This paper presents a weighted

    routing protocol for heterogeneous networks, which could

    be used in such a scenario.

    1 Introduction

    In emergency scenarios such as fires or earthquakes,

    quickly deployed sensor networks can lend vital support to

    first responders like firefighters and rescue teams. When

    first responders arrive at the scene, they should be able

    to communicate with all sensor nodes in their immediate

    vicinity, or even nodes farther away, depending on the in-

    tended use. An application for the former would be fire-

    fighters, who measure the heat levels in the immediate area

    they are moving to, using sensors that have been installed in

    the building previously. An application for the latter wouldbe finding the way out of the burning building for the same

    firefighters. If they dropped a few sensors on the way in,

    they could determine a safe route back. When they reach

    the trapped people, they would request the heat levels mea-

    sured by the nodes at the entrances/exits of the building. If

    the values returned from some sensors are too high, or there

    is no answer at all, they would know that this route was

    not safe anymore and choose a different way out. Figure 1

    shows an example of such a communication. The firefight-

    ers have entered the building from 3 different entrances and

    planted sensor nodes on the way. Now they meet in the

    center, and try do determine a safe route back out. Three ofthem request temperature values from the nodes they placed

    at the entrances. For simplicity the following communica-

    tion back to the firefighters is not shown here.

    Another application would be the communication among

    the firefighters. Currently this communication and the com-

    munication between a firefighter and the operation con-

    trollers is very lossy. If things go bad, and a house is about

    to collapse, the controllers send an evacuation signal. But

    sometimes, this signal is not received by all of the firefight-

    ers, leading to danger of injuries and sometimes even death.

    In our approach the evacuation order would be sent over

    multiple networks - the currently used one, the wirelessLAN of the PDAs and the sensor network. The specialty

    is, that the communication can switch between networks at

    any time. If specified, a message of high priority like an

    evacuation order received by a PDA will be flooded into the

    sensor network as well as the wireless LAN. This way, even

    firefighters who are not in direct communication range with

    any other can be reached through multiple sensor network

    hops. As this of course drains energy from the sensor nodes,

    a multiple network flooding should only be used in extreme

    cases, when it is absolutely vital to reach all firefighters. But

    the situation mentioned before is of course such one, as the

    life of the firefighters might be at stake. Figure 2 shows an

    example for such a communication. The PDA in the leftupper corner just received an abort mission signal, which is

    then flooded through both networks. All PDAs within range

    receive it, and the corresponding firefighters evacuate. The

    firefighters carrying the PDAs in the right corner would nor-

    mally not have received the signal, but are now evacuating,

    too, as the signal was relayed by the sensor nodes.

    This paper is structured as follows: The weighted routing

    protocol is described in section 2, while section 3 shows the

  • 8/9/2019 karnapke-routingSensornetMANET

    2/7

    Figure 1. Communication from PDAs to designated WSN nodes

    Figure 2. Emergency flooding through multi-ple networks

    results of the simulations and experiments we made. Re-

    lated work can be found in section 4. We finish with con-

    clusion and future work in section 5.

    2 A Routing Protocol for Mobile Heteroge-

    neous Networks

    2.1 Requirements

    Our scenario produces a number of requirements for the

    routing protocol:

    ID-based Addressing To communicate with nodes in the

    immediate vicinity a local broadcast is enough. To commu-

    nicate with distant nodes, a geographic approach might be

    considered good. But GPS does not work inside buildings,

    and GPS receivers are still too expensive, if nodes should

    be used in large quantities. Other localization algorithms

    are not accurate enough or take too much time. A data cen-

    tered approach is not useful either. A firefighter that looks

    for the way out of a burning building will not be interested

    in the heat levels from all nodes in the building. Rather, only

    the nodes that are near a certain exit or on the way there are

    of interest. Therefore, we choose to use ID-based address-

    ing. When the firefighters drop nodes, their ID is recorded

    automatically, or even preprogrammed before entering.

    Support for Heterogeneous Networks and Architectures

    Due to the scenario, communication must be possible be-tween hand held devices and sensor nodes. We assume that

    the sensor nodes are equipped with a cheap communication

    module which supplies only basic functionality with little

    bandwidth and low data rate. The PDAs on the other hand

    use wireless LAN to communicate among each other and a

    zigbee radio module to communicate with the sensor nodes.

    This leads to a number of problems that have to be solved,

    e.g. the different size of basic data types (8 or 16 bit for an

    integer) or the internal representation of bytes (big or little

    endian).

    Ad-Hoc Topologies and Mobility While the Sensornodes are assumed to be immobile, the firefighters are mov-

    ing through the burning building (that is their job after all).

    This means that the logical topology, which denotes the

    topology determined by radio neighborhood, is constantly

    changing. While the connections between sensor nodes are

    assumed to be fairly static, the connections between sen-

    sor nodes and firefighters PDAs change often, as do those

    between firefighters.

  • 8/9/2019 karnapke-routingSensornetMANET

    3/7

    Low Overhead for the Sensor nodes All sensor nodes

    currently available have severe resource limitations. This is

    valid for the memory (e.g. 10kB of Ram and 48 kB of Rom

    on a TMote Sky) as well as for the communication band-

    width and the energy reserves. All these make designing

    a routing protocol for wireless sensor networks much more

    challenging then designing one for traditional networks.

    Limited Unicast and Broadcast To enable efficient col-

    lective operations it is necessary to supply the ability to ad-

    dress a single node within a certain range of hops (Unicast)

    and to distribute messages to all nodes within a certain num-

    ber of hops (n-hop Broadcast). For efficiency purposes it is

    also useful to enable different forms of broadcast for the

    PDAs. As they could distribute a broadcast over different

    networks, it is possible to transmit only into one of them

    (WSN/Manet) or into both.

    Tolerance for Asymmetric and Unidirectional Links

    Experiments with real networks e.g. [12] have shown that

    asymmetric and even unidirectional links are quite common

    in wireless sensor networks. Therefore, a way of dealing

    with them has to be found.

    2.2 Different Approaches to Connect Dif-ferent Networks

    There is a number of different ways to connect heteroge-

    neous networks. The most prominent method is inter net-

    working as used in the internet. In this approach, there can

    be any number of different networks (autonomous systems,

    AS) with different routing strategies, that are connected.But this approach requires all nodes to have an IP-Address.

    For wireless sensor networks, this approach has been shown

    to be inefficient, because of the overhead of transmitting a

    large IP-Header with every message, whereas the payload

    is often only a few bytes.

    Another solution would be to use IP-Addresses for the

    PDAs, and simple IDs in the sensor network (WSN-ID).

    This would require the usage of gateways for address trans-

    lation or heterogeneous addressing, where each sensor node

    needs to know the IP-Addresses of the PDAs it is communi-

    cating with as well as the WSN-ID of its surrounding nodes.

    This would lead to a lot of memory consumption on the

    sensor nodes. Also, in the case of communication betweenWSN and PDAs, the IP-Address would have to be transmit-

    ted, in the worst case through the whole sensor network.

    A third possibility is to use a unified addressing scheme

    for both networks, that is based on WSN-IDs. In this case,

    the IP-Addresses of the PDAs would be ignored, and the

    unified addressing used on top of raw WLAN broadcast.

    This has the advantage of reducing the overhead in the

    WSN.

    2.3 The implemented Approach

    To minimize the overhead in the sensor network, a flat

    address space was chosen. The MANET nodes use the same

    address type as the sensor nodes. Because the PDAs have

    stronger batteries and a longer range, most of the communi-

    cation should take place in the MANET. In our implementa-tion the connections between nodes are weighted with a cost

    metric, which can be individually tuned. Figure 3 shows an

    example where each connection involving a sensor node is

    assigned a cost of 2, and pure MANET connections a cost

    of 1. In this example, the node in the upper left of the sensor

    net needs to communicate with the one in the lower right.

    As there is a MANET nearby, this can be used as a commu-

    nication backbone. The communication through the sensor

    network would involve 6 nodes for a cost of 12, whereas

    the communication through the MANET involves 2 sen-

    sor nodes , 2 switches between the network and 3 MANET

    hops, leading to a total cost of 4+4+3 = 11. The difference

    becomes stronger when the difference of costs is higher.

    Figure 3. Routing in a weighted heteroge-neous network

    To further reduce the network load in the sensor network,

    the addresses are divided into sensor identities and MANET

    identities. This way, a node always knows in which network

    the destination can be found. This is also useful to limit the

    range of multi hop broadcasts inside either the MANET or

    the sensor network.In some cases, like the afore mentioned emergency evac-

    uation, a spreading through both networks is wanted. To

    enable all these different scenarios, the addressing scheme

    depicted in figure 4 is used. The most significant bit decides

    if one or both interfaces should be used on a MANET node,

    on the sensor nodes only one is available. The second bit

    is used as identifier for the network the destination can be

    found in. The address of the node takes up the rest of the

  • 8/9/2019 karnapke-routingSensornetMANET

    4/7

  • 8/9/2019 karnapke-routingSensornetMANET

    5/7

  • 8/9/2019 karnapke-routingSensornetMANET

    6/7

    Table 1. Single Hop Scenario resultspackets delivery ratio RTT min avg max

    100 94% 103 ms 299 ms 537 ms

    Table 1 shows the results of our measurements. The 6%packet loss can easily be explained by collisions between

    route request- and acknowledgement packets. These exper-

    iments were only meant to show that communication was

    possible at all, but also already hint at a possible problem:

    due to the usage of the Tmote as modem for the laptop, the

    difference between minimal and maximal round-trip-time

    (jitter) is very high.

    3.2.2 MANET-MANET-WSN

    The setup of the second row of experiments featured the

    Tmotes and two laptops, one of which again used another

    Tmote as modem. The layout of the experiment can be seenin figure 11. The laptop on top wanted to communicate with

    the sensor nodes, using the laptop on the middle as a gate-

    way.

    Figure 11. Ping-Pong scenario setup

    The results of these experiments are depicted in table 2.

    It can be seen that he additional MANET hop increased the

    round-trip-time by at least 95 ms, up to 284 ms. This seems

    to imply (as will be shown later) that the transition between

    networks and the communication on the laptop takes much

    more time than that between Tmotes.

    Table 2. Measured round trip time Ping-PongScenario

    packets delivery ratio RTT min avg max

    100 92% 198 ms 498 ms 821 ms

    3.2.3 WSN-MANET-MANET-WSN

    The third row of experiments featured communication be-

    tween two Tmotes, using a MANET tunnel in between. In

    figure 12 the sensor node on the left side wanted to transmit

    to the senor node on the right side. As they were not within

    range, communication was only possible using the WLAN

    of the laptops in between.

    Figure 12. Tunnelling WSN packets through aMANET

    Table 3 shows the achieved packet delivery ratio and

    round-trip-time. Note, that for all experiments no MAC

    layer was used. While this was no problem for those de-

    picted above, it was devastating for this setup. The rate of86% was only achieved by disabling the data packets, be-

    cause they kept colliding with the next route request.

    Table 3. Results of the tunnel scenariopackets delivery ratio RTT min avg max

    100 86% 310 ms 514 ms 770 ms

    3.2.4 WSN Multihop

    In this last row of experiments only Tmotes were used,

    which were arranged in a row of 2, 3 or 4 nodes. Table4 shows the results of these experiments. As suggested ear-

    lier, the communication between Tmotes is fairly fast, and

    the jitter is fairly low. Each hop seems to add about 30 ms

    to the round trip time.

    Table 4. Measured multihop round trip timeshops delivery ratio RTT min avg max

    1 97% 20 ms 29 ms 30 ms

    2 81% 50 ms 56 ms 60 ms

    3 94% 70 ms 87 ms 100 ms

    4 Related Work

    The idea of adding firefighters with sensor networks has

    been proposed in different ways. Sometimes the sensors are

    used to find trapped people or to monitor the health status of

    the firefighters themselves [4]. Siren [2] uses a tuple-space

    like abstraction to exchange data about measured heat val-

    ues between firefighters. The main difference between their

  • 8/9/2019 karnapke-routingSensornetMANET

    7/7

    approach and our is that we determine the heat levels from a

    distance, whereas in theirs one of the firefighters must have

    received the values directly, before forwarding them to his

    colleagues.

    The authors of [7] introduced TEEN and its successor

    APTEEN [8]. Teen is a hierarchical cluster based routing

    protocol for wireless sensor networks. In this protocol, sen-sors are gathered in groups (so called clusters), with one of

    them as leader (cluster-head). Communication inside these

    groups always takes place between one of the nodes and the

    cluster-head. Communication between different clusters is

    possible only from one cluster-head to another. In our ap-

    proach the higher cost assigned to the hops between sensor

    nodes leads to more of the communication taking place be-

    tween the PDAs than between sensor nodes. If the number

    of PDAs is high enough, and there is always a PDA within

    reach of any sensor node that wants to transmit, the PDAs

    would behave like the cluster-heads in TEEN.

    The routing protocol AODV, which was modified for this

    work was introduced in [11]. It was intended as a protocol

    for MANETs, and is in its original form too heavy-weighted

    to be used in sensor networks. However, with the modifica-

    tions we made, we were able to adapt it to run on a Tmote

    Sky without running into memory or energy problems.

    Many other routing protocols for sensor networks use

    different metrics. These include among others the hop

    count, the minimal energy consumed along the way or the

    remaining energy of each node [14, 10], or the load on par-

    ticular nodes, to name but a few. Our approach also keeps

    in mind the energy constraints on the sensor nodes, but not

    focused on the single sensor nodes. Rather, our approach

    tries to shift as much traffic as possible to the much stronger(larger battery, higher bandwidth, greater range) PDAs.

    5 Conclusion and Future Work

    In this paper we have presented a combined routing

    protocol for sensor networks and WLAN based MANETs.

    The proposed approach uses weighted connections between

    nodes to determine which path to take. We have deliberately

    chosen a simple metric that is not hard to compute and can

    easily be implemented on resource constraint sensor nodes,

    too. The results of our simulations show the advantages ofthis approach and the feasibility of the approach has been

    demonstrated using a prototype implementation on Tmote

    Sky sensor nodes and laptops. However, more research with

    a larger number of nodes is clearly necessary. In the future,

    we would like to combine this routing protocol with the col-

    lective operations of COCOS [5], a high level middleware

    layer that provides data parallel operations on entire groups

    of sensor nodes.

    References

    [1] M. Brzozowski, R. Karnapke, and J. Nolte. Impact - a fam-

    ily of cross-layer transmission protocols for wireless sensor

    networks. In The First International Workshop on Research

    Challenges in Next Generation Networks for First Respon-

    ders and Critical Infrastructures (NetCri 07), in conjunction

    with 26th IEEE IPCCC, 2007.

    [2] X. Jiang, N. Chen, K. Wang, L. Takayama, and J. Landay.

    Siren: Context-aware computing for firefighting.

    [3] R. Karnapke and J. Nolte. Copra - a communication process-

    ing architecture for wireless sensor networks. In Euro-Par

    2006 Parallel Processing, pages 951960. Springer, 2006.

    [4] K. Koumpis, L. Hanna, and S. Hailes. Tunnels of ter-

    ror. IEE Computing and Control Engineering Magazine,

    Dec/Jan 2005/06.

    [5] M. Kruger, R. Karnapke, and J. Nolte. In-network process-

    ing and collective operations using the cocos-framework. In

    12th IEEE Conference on Emerging Technologies and Fac-

    tory Automation, 2007.

    [6] A. Lagemann and J. Nolte. Csharpsimplemodule writing

    omnet++ modules with c# and mono. In OMNeT++ 2008,

    Marseille, March 2008.

    [7] A. Manjeshwar and D. P. Agrawal. Teen: A routing pro-

    tocol for enhanced efficiency in wireless sensor networks.

    In Proceedings 15th International Parallel and Distributed

    Processing Symposium., pages 20092015, 2001.

    [8] A. Manjeshwar and D. P. Agrawaly. Apteen: A hybrid proto-

    col for efficient routing and comprehensive information re-

    trieval in wireless sensor networks. In Proceedings Interna-

    tional, IPDPS Parallel and Distributed Processing Sympo-

    sium, pages 195202, 2002.

    [9] S. Mank, R. Karnapke, and J. Nolte. An adaptive tdma based

    mac protocol for mobile wireless sensor networks, best pa-

    per award. In International Conference on Sensor Technolo-

    gies and Applications, 2007.

    [10] O. Moussaoui and M. Nami. A distributed energy aware

    routing protocol for wireless sensor networks. In PE-

    WASUN 05: Proceedings of the 2nd ACM international

    workshop on Performance evaluation of wireless ad hoc,

    sensor, and ubiquitous networks, pages 3440, New York,

    NY, USA, 2005. ACM.

    [11] C. E. Perkins and E. M. Royer. ad hoc on-demand distance

    vector routing.. In Proceedings of the 2nd IEEE Workshop

    on Mobile Computing Systems and Applications, New Or-

    leans, LA, pages 90100, FEB 1999.

    [12] Turau, Renner, and Venzke. The heathland experiment: Re-

    sults and experiences. In Proceedings of the REALWSN05

    Workshop on Real-World Wireless Sensor Networks., Jun

    2005.[13] A. Varga. The omnet++ discrete event simulation system.

    In Proceedings of the European Simulation Multiconference

    (ESM2001), Prague, Czech Republic, June 2001.

    [14] Y. Yu, R. Govindan, and D. Estrin. Geographical and energy

    aware routing: A recursive data dissemination protocol for

    wireless sensor networks, 2001.